{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:14:33Z","timestamp":1763100873767,"version":"3.45.0"},"reference-count":53,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T00:00:00Z","timestamp":1740268800000},"content-version":"vor","delay-in-days":53,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2024.059018","type":"journal-article","created":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T02:44:18Z","timestamp":1734662658000},"page":"1901-1924","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["LEGF-DST: LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection"],"prefix":"10.32604","volume":"82","author":[{"given":"Xin","family":"Tong","sequence":"first","affiliation":[]},{"given":"Hanming","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Jingya","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Guangming","family":"Ling","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1209","DOI":"10.1002\/sec.577","article-title":"Simple SMS spam filtering on independent mobile phone","volume":"5","author":"Taufiq Nuruzzaman","year":"2012","journal-title":"Secur. Commun. Netw."},{"key":"ref2","first-page":"2404","article-title":"Graph-based KNN algorithm for spam SMS detection","volume":"19","author":"Ho","year":"2013","journal-title":"J. Univers. Comput. Sci."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1177\/0165551515616310","article-title":"SMS spam filtering and thread identification using bi-level text classification and clustering techniques","volume":"43","author":"Nagwani","year":"2017","journal-title":"J. Inf. Sci."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1016\/j.eswa.2016.08.038","article-title":"Factorial design analysis applied to the performance of SMS anti-spam filtering systems","volume":"64","author":"Aragao","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"39853","DOI":"10.1007\/s11042-022-12991-0","article-title":"Spam SMS filtering based on text features and supervised machine learning techniques","volume":"81","author":"Abid","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.3390\/app10145011","article-title":"A discrete hidden markov model for SMS spam detection","volume":"10","author":"Xia","year":"2020","journal-title":"Appl. Sci."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"19897","DOI":"10.1007\/s11042-023-16327-4","article-title":"Legitimate and spam sms classification employing novel ensemble feature selection algorithm","volume":"83","author":"Kumar","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref8","article-title":"An enhanced random forest approach using coclust clustering: MIMIC-III and SMS spam collection application","volume":"10","author":"Ilhan Taskin","journal-title":"J. Big Data"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"11259","DOI":"10.1007\/s00500-023-08587-x","article-title":"A high-quality feature selection method based on frequent and correlated items for text classification","volume":"27","author":"Mamdouh Farghaly","year":"2023","journal-title":"Soft Comput."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"10339","DOI":"10.1016\/j.jksuci.2022.10.025","article-title":"Two-phase fuzzy feature-filter based hybrid model for spam classification","volume":"34","author":"Juneja","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.6989","article-title":"A deep learning method for automatic SMS spam classification: Performance of learning algorithms on indigenous dataset","volume":"34","author":"Abayomi-Alli","year":"2022","journal-title":"Concurr. Comput."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1016\/j.future.2019.09.001","article-title":"Deep learning to filter SMS spam","volume":"102","author":"Roy","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.neucom.2022.08.076","article-title":"Category-learning attention mechanism for short text filtering","volume":"510","author":"Xia","year":"2022","journal-title":"Neurocomputing"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.3390\/electronics11152418","article-title":"Chinese spam detection using a hybrid BiGRU-CNN network with joint textual and phonetic embedding","volume":"11","author":"Yao","year":"2022","journal-title":"Electronics"},{"key":"ref15","unstructured":"Z. Lan, \u201cALBERT: A lite bert for self-supervised learning of language representations,\u201d 2019, arXiv:1909.11942."},{"key":"ref16","unstructured":"Y. Liu, \u201cRoBERTa: A robustly optimized BERT pretraining approach,\u201d 2019, arXiv:1907.11692."},{"key":"ref17","unstructured":"Y. Sun et al., \u201cERNIE: Enhanced representation through knowledge integration,\u201d 2019, arXiv:1904.09223."},{"key":"ref18","series-title":"Findings of the Association for Computational Linguistics: EMNLP 2020","first-page":"4163","article-title":"TinyBERT: Distilling BERT for natural language understanding","author":"Jiao"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"80253","DOI":"10.1109\/ACCESS.2021.3081479","article-title":"A spam transformer model for SMS spam detection","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Access"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.3390\/s23083861","article-title":"Enhancing spam message classification and detection using transformer-based embedding and ensemble learning","volume":"23","author":"Ghourabi","year":"2023","journal-title":"Sensors"},{"key":"ref21","series-title":"2023 4th Int. Conf. Intell. Comput. Human-Comput. Interaction (ICHCI)","first-page":"448","article-title":"A BERT-GCN-based detection method for FBS telecom fraud Chinese SMS texts","author":"Zhang","year":"2023"},{"key":"ref22","series-title":"2024 6th Int. Conf. Commun., Inform. Syst. Comput. Eng. (CISCE)","first-page":"1078","article-title":"Chinese fraudulent text message detection based on graph neural networks","author":"Gao","year":"2024"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3538491","article-title":"SpotSpam: Intention analysis-driven SMS spam detection using bert embeddings","volume":"16","author":"Oswald","year":"2022","journal-title":"ACM Trans. Web (TWEB)"},{"key":"ref24","unstructured":"J. Achiam et al., \u201cGPT-4 technical report,\u201d 2023, arXiv:2303.08774."},{"key":"ref25","unstructured":"J. Cui, Z. Li, Y. Yan, B. Chen, and L. Yuan, \u201cChatlaw: Open-source legal large language model with integrated external knowledge bases,\u201d 2023, arXiv:2306.16092."},{"key":"ref26","unstructured":"S. Wu et al., \u201cBloombergGPT: A large language model for finance,\u201d 2023, arXiv:2303.17564."},{"key":"ref27","first-page":"1","article-title":"A generalist vision-language foundation model for diverse biomedical tasks","author":"Zhang","year":"2024","journal-title":"Nat. Med."},{"key":"ref28","unstructured":"H. Wang et al., \u201cHuaTuo: Tuning llama model with chinese medical knowledge,\u201d 2023, arXiv:2304.06975."},{"key":"ref29","first-page":"688","article-title":"Using large language models in psychology","volume":"2","author":"Demszky","year":"2023","journal-title":"Nat. Rev. Psychol."},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1016\/j.birob.2023.100131","article-title":"Large language models for human-robot interaction: A review","author":"Zhang","year":"2023","journal-title":"Biomimetic Intell. Robot."},{"key":"ref31","unstructured":"Z. Mao, R. Kobayashi, H. Nabae, and K. Suzumori, \u201cLarge language model-empowered multimodal strain sensory system for shape recognition, monitoring, and human interaction of tensegrity,\u201d 2024, arXiv:2406.10264."},{"key":"ref32","series-title":"Proc. 4th Workshop NLP Conversational AI","first-page":"47","article-title":"Data augmentation for intent classification with off-the-shelf large language models","author":"Sahu","year":"2022"},{"key":"ref33","unstructured":"J. Ye et al., \u201cLLM-DA: Data augmentation via large language models for few-shot named entity recognition,\u201d 2024, arXiv:2402.14568."},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1109\/JBHI.2024.3435085","article-title":"CALLM: Enhancing clinical interview analysis through data augmentation with large language models","author":"Wu","year":"2024","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.3390\/app14083532","article-title":"RumorLLM: A rumor large language model-based fake-news-detection data-augmentation approach","volume":"14","author":"Lai","year":"2024","journal-title":"Appl. Sci."},{"key":"ref36","first-page":"7370","article-title":"Graph convolutional networks for text classification","volume":"33","author":"Yao","year":"2019","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref37","series-title":"Conf. Empir. Methods Nat. Lang. Process. (EMNLP)","article-title":"Text graph transformer for document classification","author":"Zhang","year":"2020"},{"key":"ref38","series-title":"Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021","first-page":"1456","article-title":"BERTGCN: Transductive text classification by combining GNN and BERT","author":"Lin","year":"2021"},{"key":"ref39","first-page":"8409","article-title":"Tensor graph convolutional networks for text classification","volume":"34","author":"Liu","year":"2020","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref40","series-title":"Proc. 36th Int. Conf. Neural Inform. Process. Syst.","article-title":"Training language models to follow instructions with human feedback","author":"Ouyang","year":"2022"},{"key":"ref41","series-title":"Proc. 2019 Conf. Empirical Methods Nat. Lang. Process. 9th Int. Joint Conf. Nat. Lang. Proc. (EMNLP-IJCNLP)","first-page":"6382","article-title":"EDA: Easy data augmentation techniques for boosting performance on text classification tasks","author":"Wei","year":"2019"},{"key":"ref42","unstructured":"T. GLM. et al., \u201cChatGLM: A family of large language models from GLM-130B to GLM-4 all tools,\u201d 2024, arXiv:2406.12793."},{"key":"ref43","unstructured":"A. Yang et al., \u201cBaichuan 2: Open large-scale language models,\u201d 2023, arXiv:2309.10305."},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2023.127063","article-title":"RoFormer: Enhanced transformer with rotary position embedding","volume":"568","author":"Su","year":"2024","journal-title":"Neurocomputing"},{"key":"ref45","series-title":"Adv. Neural Inform. Process. Syst.","article-title":"Attention is all you need","author":"Vaswani","year":"2017"},{"key":"ref46","unstructured":"P. Veli\u010dkovi\u0107, G. Cucurull, A. Casanova, A. Romero, P. Lio and Y. Bengio, \u201cGraph attention networks,\u201d 2017, arXiv:1710.10903."},{"key":"ref47","first-page":"18661","article-title":"Supervised contrastive learning","volume":"33","author":"Khosla","year":"2020","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"ref48","series-title":"Proc. 2020 ACM SIGSAC Conf. Comput. Commun. Secur.","first-page":"521","article-title":"Lies in the air: Characterizing fake-base-station spam ecosystem in China","author":"Zhang","year":"2020"},{"key":"ref49","first-page":"6639","article-title":"CatBoost: Unbiased boosting with categorical features","author":"Prokhorenkova","year":"2018","journal-title":"Proc. 32nd Int. Conf. Neural Inform. Process. Syst."},{"key":"ref50","series-title":"Proc. Eighth Int. Joint Conf. Nat. Lang. Process.","first-page":"253","article-title":"A sensitivity analysis of (and practitioners\u2019 guide to) convolutional neural networks for sentence classification","author":"Zhang","year":"2017"},{"key":"ref51","series-title":"Proc. 55th Annual Meet. Assoc. Comput. Linguist.","first-page":"562","article-title":"Deep pyramid convolutional neural networks for text categorization","author":"Johnson","year":"2017"},{"key":"ref52","series-title":"NIPS 2014 Workshop Deep Learn.","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"Chung","year":"2014"},{"key":"ref53","series-title":"2019 16th Int. Joint Conf. Comput. Sci. Soft. Eng. (JCSSE)","first-page":"181","article-title":"Text generation for imbalanced text classification","author":"Akkaradamrongrat","year":"2019"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-82-2\/TSP_CMC_59018\/TSP_CMC_59018.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:10:50Z","timestamp":1763100650000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v82n2\/59488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":53,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.059018","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-09-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-17","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}